Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 18:00
Behavioral task
behavioral1
Sample
2d003e2d1efc8092df19c285257262cb769c98cde02f984ac8ef1c7cd7a62ed8.exe
Resource
win7-20241010-en
General
-
Target
2d003e2d1efc8092df19c285257262cb769c98cde02f984ac8ef1c7cd7a62ed8.exe
-
Size
339KB
-
MD5
3a3d645ae76afd98ed7ee668467d6ed3
-
SHA1
d23a0b2f035f9b84a62b310922ba6fdaf919ce70
-
SHA256
2d003e2d1efc8092df19c285257262cb769c98cde02f984ac8ef1c7cd7a62ed8
-
SHA512
cb5b515495f1179e69f17816b23450d338d64d9bafb030512d4d0282547fcaf2383ce37926c13283887d19d2f9dfa63e8c61b27867c3534b5d37fe751de5d46e
-
SSDEEP
6144:nMMt+bZf0d6McOvwv6zGhtrys2NOr8Yyn5TNOr8Yyn5ODi:nMMt0ZPMIlhtr8NO4jnhNO4jnMDi
Malware Config
Extracted
jwtloader
https://cdn-gravitiumgame.xyz/wpfg
http://xilloolli.com/api-debug.php
https://shacolasemporiumpark.com
http://mysticsmirage.com/api.php
Signatures
-
Detects JWTloader aka JohnWalkerTexasLoader payload 1 IoCs
JWTloader or JohnWalkerTexasLoader is a loader/downloader written in C#.
Processes:
resource yara_rule behavioral1/memory/2580-1-0x000000013F790000-0x000000013F7E8000-memory.dmp family_jwtloader -
Jwtloader family
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
2d003e2d1efc8092df19c285257262cb769c98cde02f984ac8ef1c7cd7a62ed8.exedescription pid Process procid_target PID 2580 wrote to memory of 2080 2580 2d003e2d1efc8092df19c285257262cb769c98cde02f984ac8ef1c7cd7a62ed8.exe 30 PID 2580 wrote to memory of 2080 2580 2d003e2d1efc8092df19c285257262cb769c98cde02f984ac8ef1c7cd7a62ed8.exe 30 PID 2580 wrote to memory of 2080 2580 2d003e2d1efc8092df19c285257262cb769c98cde02f984ac8ef1c7cd7a62ed8.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d003e2d1efc8092df19c285257262cb769c98cde02f984ac8ef1c7cd7a62ed8.exe"C:\Users\Admin\AppData\Local\Temp\2d003e2d1efc8092df19c285257262cb769c98cde02f984ac8ef1c7cd7a62ed8.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2580 -s 5322⤵PID:2080
-